Services Computing

Guest Editor's Introduction • Liang-Jie (LJ) Zhang • January 2011

Theme Articles


This month's theme includes the following featured articles:

Interacting with the SOA-Based Internet of Things:
Discovery, Query, Selection, and On-Demand Provisioning of Web Services

This process and system architecture enable developers and business process designers to dynamically query, select, and use running instances of services, or deploy new ones on demand, in the context of composite, real-world business applications. More »

Secure Virtual Machine Execution under an Untrusted OS
A proposed virtualization architecture provides a secure run-time environment, network interface, and secondary storage for a guest VM, leading to improved security in an untrusted management environment. More »

Benchmarking Vulnerability Detection Tools
for Web Services

Learn about a benchmarking approach to assess and compare the effectiveness of vulnerability-detection tools in web services environments. More »

A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks
Searching for service providers via social networks requires the evaluation of those providers' trustworthiness along a social trust path. An efficient heuristic algorithm, H_OSTP, could solve this challenging problem. More »

A Reference Model for Master of Science Program
in Services Computing

Despite the increasing importance of services computing in the IT and business sectors, few systematic guidelines exist for building graduate programs in this field. This reference model can help academic institutions and accreditation agencies develop relevant curricula. More »

What else is new? »

 

Services ComputingServices computing cuts across various disciplines to cover the science and technology of bridging the gap between business services and IT services. The underlying technology suite includes Web services and service-oriented architecture (SOA), cloud computing, business consulting methodology and utilities, and business process modeling, transformation, and integration. In terms of scope, services computing covers the whole lifecycle of the services innovation process, which includes

  • business componentization,
  • services modeling, creation, realization, annotation, deployment, discovery, composition, delivery, monitoring, optimization, and management, and
  • service-to-service collaboration.

The goal of services computing is to enable IT services and computing technology to create, operate, and manage business services more efficiently and effectively.

In this month's theme, I would like to share with you some example papers from IEEE Transactions on Services Computing and conferences sponsored by the IEEE Computer Society's Technical Committee on Services Computing (TC-SVC).

In "Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services," Dominique Guinard and his coauthors apply the SOA concept to couple functionality of embedded real-world devices. Their infrastructure lets users dynamically query, select, and use real-world services.

In "Secure Virtual Machine Execution under an Untrusted OS," Chunxiao Li, Anand Raghunathan, and Niraj K. Jha attack one critical virtualization problem in cloud computing. They propose a virtualization architecture to provide a secure execution environment on a virtualized computing platform under the assumption of an untrusted management operating system.

In "Benchmarking Vulnerability Detection Tools for Web Services," Nuno Antunes and Marco Vieira propose a benchmarking approach to assess and compare the effectiveness of tools for detecting vulnerabilities in web services.

In "A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks," Guanfeng Liu and colleagues tackle the issue of finding trustworthy service providers through social networks. They propose a heuristic algorithm to find the optimal social trust path in a social network structure modeled as a Multi-Constrained Optimal Path (MCOP) selection problem.

In "A Reference Model for Master of Science Program in Services Computing," my coauthors and I present a reference model of a master's program in services computing, to serve as curriculum guidelines for academic institutions and accreditation agencies. The program recommends a set of core and elective courses.

I also take this opportunity to share with you some related links to information about major activities sponsored by TC-SVC and other resources. I hope that you enjoy this theme and find this information useful.

 

Liang-Jie (LJ) Zhang Liang-Jie (LJ) Zhang is currently a senior vice president, chief scientist, and director of research at Kingdee International Software Group Company Limited. He's also the editor in chief of IEEE Transactions on Services Computing. Contact him at http://domino.research.ibm.com/comm/research_people.nsf/pages/zhanglj8.index.html.

 

 

Page Ratings Page Ratings

Average (0 Votes)

Article Comments

Please login to post comments.

What's New

Is Your Phone Killing the Internet?
Without the Internet and its unlimited capability for exploration and experimentation, much of our creativity would vanish. More »

2012 Isn't the End of the World
The IPv4 address space will be exhausted by 2012 or sooner. It's time to implement IPv6 everywhere in the Internet and to assure full connectivity among all IPv6-capable devices and subnetworks. More »

Toward Mobile Eye-Based Human-Computer Interaction
Advances in mobile eye-tracking equipment and automated eye-movement analysis now allow for investigating eye movements during natural behavior and promise to bring eye-based interaction into people's everyday lives. More »

Security and Privacy Challenges in Cloud Computing Environments
Explore roadblocks and solutions to providing a trustworthy cloud computing environment. More »

The SARC Architecture
The Scalable Computing Architecture (SARC) is one of several projects featured in a special issue on multicore computing in Europe. More »

The Dawn of Predictive Chip Yield Design: Along and Beyond the Memory Lane
A simulation technique that distorts the natural Monte Carlo sampling function produces more samples in important regions of the design space. More »

Your Brain, Your Computer, and You
Passive brain-computer interfaces increase the bandwidth from user to computer in new and uniquely powerful ways. More »

An Integrated Framework for Avatar Data Collection from the Virtual World
To mine the rich social media data in virtual worlds, an integrated framework combines bot- and spider-based approaches to collect avatar behavioral and profile data. More »

Crowdsourcing What Is Where
Social media generate rich sets of georeferenced photos, which are being used in applications to annotate locations around the world.
More
»

Advanced Architectures and Execution Models to Support Green Computing
Creating the next generation of power-efficient parallel computers requires rethinking. New execution models are required to span all scales, from desktop to supercomputer. More »

Where in the World Is Carmen Sandiego (and Is She a Software Engineer)?
Are cultural differences in how software engineering is practiced so profound that even a super spy couldn't fool her colleagues? More »

Using Tracing to Diagnose or Monitor Systems
In today's increasingly complex systems and multicore technologies, more and more problems can only be diagnosed via tracing tools. Here's a look at LTTng. More »

Improved Scatterplot Design
A proposed hybrid scatterplot design aims to present bivariate data with more information than classic scatterplots. More »